SUBJECT CODE
A-04-03
SUBJECT
PAPER
III
COMPUTER SCIENCE AND APPLICATIONS
HALL TICKET NUMBER
QUESTION BOOKLET
NUMBER
OMR SHEET NUMBER
DURATION
MAXIMUM MARKS
2 HOUR 30 MINUTES
150
NUMBER OF PAGES
NUMBER OF QUESTIONS
16
75
This is to certify that, the entries made in the above portion are correctly written and verified.
Candidate’s Signature
Name and Signature of Invigilator
A¿æýÅÆæÿ$¦ËMæü$ çÜ*^èþ¯èþË$
Instructions for the Candidates
1. Write your Hall Ticket Number in the space provided on the top
of this page.
2. This paper consists of seventy five multiple-choice type of
questions.
3. At the commencement of examination, the question booklet will
be given to you. In the first 5 minutes, you are requested to open
the booklet and compulsorily examine it as below :
(i) To have access to the Question Booklet, tear off the paper
seal on the edge of this cover page. Do not accept a booklet
without sticker-seal and do not accept an open booklet.
(ii) Tally the number of pages and number of questions in
the booklet with the information printed on the cover
page. Faulty booklets due to pages/questions missing
or duplicate or not in serial order or any other
discrepancy should be got replaced immediately by a
correct booklet from the invigilator within the period
of 5 minutes. Afterwards, neither the Question Booklet
will be replaced nor any extra time will be given.
1.
2.
3.
(iii) After this verification is over, the Test Booklet Number
should be entered in the OMR Sheet and the OMR Sheet
Number should be entered on this Test Booklet.
4.
4. Each item has four alternative responses marked (A), (B), (C)
and (D). You have to darken the circle as indicated below on the
correct response against each item.
Example : A
B
C
D
where (C) is the correct response.
5. Your responses to the items are to be indicated in the OMR Answer
Sheet given to you. If you mark at any place other than in the
circle in the Answer Sheet, it will not be evaluated.
6. Read instructions given inside carefully.
7. Rough Work is to be done in the end of this booklet.
8. If you write your name or put any mark on any part of the OMR
Answer Sheet, except for the space allotted for the relevant
entries, which may disclose your identity, you will render yourself
liable to disqualification.
9. The candidate must handover the OMR Answer Sheet to the
5.
6.
7.
8.
invigilators at the end of the examination compulsorily and 9.
must not carry it with you outside the Examination Hall. The
candidate is allowed to take away the carbon copy of OMR
Sheet and used Question paper booklet at the end of the
10.
examination.
10. Use only Blue/Black Ball point pen.
11. Use of any calculator or log table etc., is prohibited.
12. There is no negative marks for incorrect answers.
11.
12.
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
D ç³#r ò³O ¿êVæü
ÌZ CÐèþÓºyìþ¯èþ çܦË
ÌZ Ò$ çàÌý sìýMðüsý ¯èþ
ºÆæÿ$ Æ>Äæý$
yìþ.
D {ç³Ôèý² ç³{èþÐèþ$$ yðþ¿ñýOI§æþ$ ºçßý$âñýO_eMæü {ç³Ôèý²Ë¯èþ$ MæüÍW E
¨.
ç³Èæü {´ëÆæÿ
¿æýÐèþ$$¯èþ D {ç³Ôé²ç³{èþÐèþ$$ Ò$Mæü$ CÐèþÓºyæþ$èþ$
¨. Ððþ$$§æþsìý I§æþ$
°Ñ$çÙÐèþ$$ËÌZ D {ç³Ôé²ç³{èþÐèþ$$¯èþ$ ðþÇ_ Mìü
§æþ ðþÍí³¯èþ A
Ôé˯èþ$ èþç³µ°çÜÇV>
çÜÇ^èþ*çÜ$Mø
yìþ.
(i) D {ç³Ôèý² ç³{èþÐèþ$$¯èþ$ ^èþ*yæþyé°Mìü MæüÐèþÆÿõ³h A
^èþ$¯èþ E¯èþ² M>Wèþç³# ïÜË$¯èþ$
_
^èþ
yìþ. íÜtMæüPÆÿ ïÜË$Ìôý° Ðèþ$ÇÄæý$$ C¨ÐèþÆæÿMóü ðþÇ_ E¯èþ² {ç³Ôé²ç³{èþÐèþ$$¯èþ$
Ò$Ææÿ$ A
XMæüÇ
^èþÐèþ§æþ$ª.
(ii) MæüÐèþÆæÿ$ õ³h ò³O Ðèþ$${¨
_¯èþ çÜÐèþ*^鯿ÿ
{ç³M>Ææÿ
D {ç³Ôèý²ç³{èþÐèþ$$ÌZ° õ³iË
çÜ
Qůèþ$ Ðèþ$ÇÄæý$$ {ç³Ôèý²Ë çÜ
Qůèþ$ çÜÇ^èþ*çÜ$Mø
yìþ. õ³iË çÜ
QÅMæü$
çÜ
º
Ǭ
_ V>± Ìôý§é çÜ*_
_¯èþ çÜ
QÅÌZ {ç³Ôèý²Ë$ ÌôýMæü´ùÐèþ#r Ìôý§é °f{ç³
M>Mæü´ùÐèþ#r Ìôý§é {ç³Ôèý²Ë$ {MæüÐèþ$ç³§æþ®ÌZ ÌôýMæü´ùÐèþ#r Ìôý§é HÐðþO¯é óþyéË$
yæþ$r
Ðèþ
sìý §øçÙç³NÇèþÐðþ$O¯èþ {ç³Ôèý² ç³{é°² Ððþ
r¯óþ Ððþ$$§æþsìý I§æþ$ °Ñ$ÚëÌZÏ ç³È>
³ç ÆæÿÅÐóþæüMæü$°Mìü ÇW C_aÐóþÜí §é°Mìü º§æþ$Ë$V> Üç ÇV>Y E¯èþ² {ç³Ôèý²ç³{é°² ¡çÜ$Mø
yìþ.
èþ§æþ¯èþ
èþÆæÿ
{ç³Ôèý²ç³{èþÐèþ$$ Ðèþ*Ææÿaºyæþ§æþ$ A§æþ¯èþç³# çÜÐèþ$Äæý$
CÐèþÓºyæþ§æþ$.
(iii) ò³O Ñ«§þæ
V> Ü
ç Ç^èþ*çÜ$Mö¯èþ² èþÆ>Óèþ {ç³Ôé²ç³{èþ
çÜ
Qůèþ$ OMR ³ç {èþÐèþ$$ ò³O
A§óþÑ«§þæ
V> OMR ³ç {èþÐèþ$$ Üç
Qůèþ$ D {ç³Ôé²ç³{èþÐèþ$$ ò³O °ÇªÙç t Üç ˦
ÌZ Æ>Äæý$ÐèþÌñý¯èþ$.
{ç³ {ç³Ôèý²Mæü$ ¯éË$Væü$ {ç³éÅÐèþ*²Äæý$ {ç³çܵ
§æþ¯èþË$ (A), (B), (C) Ðèþ$ÇÄæý$$ (D)
Ë$V> CÐèþÓºyézÆÿ$$. {ç³{ç³Ôèý²Mæü$ çÜÆðÿO¯èþ {ç³çܵ
§æþ¯èþ¯èþ$ G¯èþ$²Mö° Mìü
§æþ ðþÍí³¯èþ Ñ«§æþ
V>
OMR ç³{èþÐèþ$$ÌZ {ç³ {ç³Ôé² çÜ
QÅMæü$ CÐèþÓºyìþ¯èþ ¯éË$Væü$ Ðèþé¢ÌZÏ çÜÆðÿO¯èþ
{ç³çܵ
§æþ¯èþ¯èþ$ çÜ*_
^óþ Ðèþ颰² »êÌý ´ëÆÿ$$
sý ò³¯þø Mìü
§æþ ðþÍí³¯èþ Ñ«§æþ
V>
ç³NÇ
^éÍ.
A
B
C
D
E§éçßýÆæÿ×ý :
(C) çÜÆðÿO¯èþ {ç³çܵ
§æþ¯èþ AÆÿ$$óþ
{ç³Ôèý²ËMæü$ {ç³çܵ
§æþ¯èþ˯èþ$ D {ç³Ôèý²ç³{èþÐèþ$$ø CÐèþÓºyìþ¯èþ OMR ç³{èþÐèþ$$ ò³O¯èþ
CÐèþÓºyìþ¯èþ Ðèþé¢ÌZϯóþ ç³NÇ
_ Væü$Ç¢
^éÍ. AÌêM>Mæü çÜÐèþ*«§é¯èþ ç³{èþ
ò³O ÐóþÆöMæü ^ør
Væü$Ç¢õÜ¢ Ò$ {ç³çܵ
§æþ¯èþ Ðèþ$*ÌêÅ
Mæü¯èþ
^óþÄæý$ºyæþ§æþ$.
{ç³Ôèý² ç³{èþÐèþ$$ ÌZç³Ë C_a¯èþ çÜ*^èþ¯èþ˯èþ$ gê{Væüèþ¢V> ^èþ§æþÐèþ
yìþ.
_èþ$¢ç³°° {ç³Ôèý²ç³{èþÐèþ$$ _ÐèþÆæÿ C_a¯èþ RêäçܦËÐèþ$$ÌZ ^óþÄæý*Í.
OMR ç³{èþÐèþ$$ ò³O °È~èþ çܦË
ÌZ çÜ*_
^èþÐèþËíܯèþ ÑÐèþÆ>Ë$ èþí³µ
_ CèþÆæÿ çܦË
ÌZ
Ò$ Væü$Ç¢
ç³#¯èþ$ ðþÍõ³ Ñ«§æþ
V> Ò$ õ³Ææÿ$ Æ>Äæý$yæþ
V>± Ìôý§é CèþÆæÿ _à²Ë¯èþ$ ò³rtyæþ
V>± ^óþíܯèþrÏÆÿ$$óþ Ò$ A¯èþÆæÿáèþMæü$ Ò$Æóÿ »ê«§æþ$ÅËÐèþ#鯿ÿ$.
ç³Èæü ç³NÆæÿ¢Æÿ$$¯èþ èþÆ>Óèþ Ò$ OMR ç³{é°² èþç³µ°çÜÇV> ç³Èæü ç³ÆæÿÅÐóþæüMæü$yìþMìü CÐéÓÍ.
Ðésìý° ³ç Èæü Væü¨ ºÄæý$rMæü$ ¡çÜ$Mæü$ÐðþâæýMÏ üæ *yæþ§æþ$. ³ç Èæü ³ç NÆæÿÆ¢ ÿ$$¯èþ èþÆæÿ$Ðéèþ A¿æýÅÆæÿ$¦Ë$
{ç³Ôèý² ³ç {é°², OMR ç³{èþ
Äñý$$MæüP M>Ææÿ¾¯þ M>ï³° ¡çÜ$Mæü$ÐðþâæýÏÐèþ^èþ$a.
±Í/¯èþËÏ Ææÿ
Væü$ »êÌý ´ëÆÿ$$
sý ò³¯þ Ðèþ*{èþÐóþ$ Eç³Äñý*W
^éÍ.
ÌêVæüÇ£æþÐþ$ sôýº$ÌýÞ, M>ÅÍMæü$ÅÌôýrÆÿË$, GË[M>t°Mü ç³ÇMæüÆ>Ë$ Ððþ$$§æþËVæü$¯èþÑ ç³ÈæüVæü¨ÌZ
Eç³Äñý*W
^èþyæþ
°õÙ«§æþ
.
èþç³ çÜÐèþ*«§é¯éËMæü$ Ðèþ*Ææÿ$PË èþWY
ç³# Ìôý§æþ$.
A-04-03
III á
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
1
DO
NO
T
WR
ITE
HE
RE
*A0403*
IIIá
2
A-04-03
*A0403*
COMPUTER SCIENCE AND APPLICATIONS
Paper – III
1. The transformation where in the object is
first rotated about X-axis and then about
Y-axis is
(A) Instant
(B) Rotation
(C) Shearing
(D) Tilting
5. What will be the decimal equivalent of
(111011.10)2 ?
(A) 48.625
(B) 59.487
2. In the Cohen-Sutherland line clipping
algorithm, “trivial reject” means
(C) 48.487
(A) That the intersection is trivial to
compute
(D) 59.625
(B) That the boundaries on the visible side
of the line are incomplete
6. An array of 32 bit integers is stored in
(C) That the process of rejection is always
trivial
addressable memory starting from the
(D) That the line is not visible when its end
points are on the invisible side of a
clipping boundary
100. If the index addressing is used to
location 2000 H. The size of the array is
access the array elements, what would be
the contents of index register ?
3. In Bresenham’s circle algorithm, we do not
require
(A) 100
(A) Floating- Point arithmetic
(B) 4
(B) Calculation along the line of a Pixel
centre
(C) 32
(C) Multiplication or division
(D) 2000 H
(D) All the above
4. The Distributive law of Boolean algebra
is
7. The three logical operations, which are
said to be logically complete, as any
(A) A+(B+C) = (A+B)+C
Boolean function may be realized using
A–(B–C) = (A –B)–C
these three operations are
(B) A+BC = (A+B)(A+C)
(A) AND, OR and NOT
A.(B+C) = A.B + A.C
(C) A +AB = A
(B) AND, OR and XOR
A(A+B) = A+B
(C) AND, OR and NAND
A + AB = A+B
(D) XOR, NOR and NAND
(D) None of the above
IIIá
3
A-04-03
*A0403*
8. Which of the following statement is correct
statement ?
11. Which of the following statement is correct
about serializability ?
(A) 2PL protocol ensures conflict
serializability
(A) Checking for view serializability is
np-complete
(B) Strict 2PL is not cascadeless
(B) Checking for conflict serializability is
np-complete
(C) Strict 2PL is not recoverable
(C) 2PL ensures view serializability
(D) 2PL is free from deadlocks
(D) Serialization graph ensures view
serializability
9. Which of the following statement is
incorrect ?
12. Call management of GSM consists of the
following entities
(A) A relation always can be decomposed
into dependency preserving BCNF
1. Call control
(B) A relation in 3NF may have some
redundancies
2. Short Message Services
3. Supplementary Services
(C) If the decompositions is dependency
preserving
all
functional
dependencies can be derived from
the individual relations
4. Traffic Channels
Which of the above is correct ?
(A) 1, 2 and 3
(D) There are relations for which there is
no dependency preserving BCNF
decomposition
(B) 1,2 and 4
(C) 2, 3 and 4
(D) 1, 3 and 4
10. When making corrections to the product
table you would use the following
command
13. In GSM, mobility management is
monitored by
(A) CHANGE PRODUCT
(A) Traffic channels
SET P_INDATE = ‘01|18|2002’
(B) Half-duplex channels
WHERE P_CODE = ‘13-Q2|P2’;
(C) Full-duplex channels
(B) ROLLBACK PRODUCT
(D) Control channels
SET P_INDATE = ‘01|18|2002’
14. The following postfix expression with
single digit operands is evaluated using a
stack
WHERE P_CODE = ‘13-Q2|P2’;
(C) EDIT PRODUCT
SET P_INDATE= ‘01|18|2002’
5 6 2 / 3 * 2 – 7 4 / +
WHERE P_CODE = ‘13-Q2|P2’;
Note that / is the exponentiation operator.
The top two elements of the stack after the
* is evaluated are
(D) UPDATE PRODUCT
IIIá
SET P_INDATE = ‘01|18|2002’
(A) 3, 5
(B) 108, 5
WHERE P_CODE = ‘13-Q2/P2’;
(C) 108, 3
(D) 112, 2
4
A-04-03
*A0403*
15. Given the contents of EMPLOYEE table,
16. The referential integrity rule requires that
the SQL command to output the table
(A) Every null foreign key value must
contents will be:
(A) SELECT
EMP_LNAME,
reference an existing primary key
value
EMP_
FNAME, EMP_INITIAL
(B) It makes it possible for an attribute to
have a corresponding value
EMP_AREA CODE, EMP_ phone
(C) Every non-null foreign key value must
FROM EMPLOYEE
reference an existing primary key
LIST BY EMP_LNAME, EMP_FNAME,
value
EMP_INITIAL;
(B) SELECT
EMP_LNAME,
(D) It makes it possible to delete a row in
EMP_
one table whose primary key does not
FNAME, EMP_INITIAL,
have a matching foreign key value in
another table
EMP_AREA CODE, EMP_PHONE
17. In CSMA/CD, after the 4th couision, what
FROM EMPLOYEE
is the probability that the node will attempt
ORDER BY EMP_LNAME, EMP_
to retransmit immediately ?
FNAME, EMP_INITIAL;
(C) SELECT
EMP_LNAME,
EMP_
FNAME, EMP_INITIAL,
(D) 0.25
(A) Through symmetric encryption such
DISPLAY BY EMP_LNAME, EMP_
as RSA
FNAME, EMP_INITIAL’
(B) Through asymmetric encryption such
EMP_
as Data Encryption Standard (DES)
FNAME, EMP_INITIAL,
(C) Through asymmetric encryption such
EMP_AREA CODE, EMP_PHONE
as Advanced Encryption Standard
(AES)
FROM EMPLOYEE
(D) Through symmetric encryption such
SEQUENCE BY EMP_LNAME, EMP_
as Data Encryption Standard (DES)
FNAME, EMP_INITIAL;
IIIá
(C) 0.125
provide confidentiality ?
FROM EMPLOYEE
EMP_LNAME,
(B) 0.5
18. How does the SSL network protocol
EMP_AREA CODE, EMP_PHONE
(D) SELECT
(A) 0.0625
5
A-04-03
*A0403*
23. According to the testing criteria “TEST
19. Which of the following do digital signatures
ALL PATHS”, what numbers must the
provide ?
following code be tested by to verify or
(A) Authentication and integrity of data
debug it completely:
(B) Authentication and confidentiality of
Scanf (& x, &y, “%d %d”);
data
if (x < 10) then
(C) Confidentiality and integrity of data
Statement 1;
(D) Authentication and availability of data
else
Statement 2;
20. The maximum data frame that can be sent
if (y > 5) then
in Ethernet is
(A) 64 Bytes
(B) 1500 Bytes
(C) 4 KB
(D) 8 KB
Statement 3;
else
Statement 4;
21. You are designing a network which needs
(A) (x, y) = (9, 7), (11, – 2), (2, 9), (8, 6)
to support 200 users. You don’t plan to
(B) (x, y) = (– 1, 9), (8, – 2), (2, 8), (19, 8)
extend the segment beyond the current
(C) (x, y) = (9, 7), (11, 3) (19, 11), (3, 4)
number of users. Which subnet mask
(D) (x, y) = (9, 19), (5, 3), (6, 11), (11, 3)
would best meet your needs ? Select the
best answer :
24. Which of the following statements is
(A) 255.255.0.0
correct about software testing ?
(B) 255.255.255.0
(A) Testing is common method of
verification
(C) 255.0.0.0
(B) Testing is common method of
(D) 255.255.255.200
validation
22. Which of the following network devices
(C) Testing common method of both
operates only in the physical layer ?
IIIá
(A) Router
(B) Bridge
(C) Switch
(D) Repeater
verification and validation
(D) Testing can be used to prove the
correctness of a program
6
A-04-03
*A0403*
28. Which of the following statements is true
about the Push Down Automata (PDA) ?
25. Which of the following machines
recognizes the even Palindrome of the
form WWR (W = word and WR being its
reverse) ?
(A) PDAs recognize context-sensitive
languages
(B) PDAs recognize
languages
(A) DFSM (Deterministic FSM)
(C) PDAs recognize type 1 languages
(B) NFSM (Non-Deterministic FSM)
(D) PDAs recognize type 0 languages
(C) DPDM (Deterministic PDM)
29. Consider the Grammar G = (N, T, P, S),
(D) NPDM (Non-Deterministic PDM)
where
N = {S, B, C}
T = {a, b}
26. Which of the following statements is not
true about FSM ?
P { (S bB), (B bc), (B aB),
(C a), (B b)}
(A) Every regular set can be recognized
by some FSM
Which of the following statement is wrong
about G ?
(B) FSM can remember arbitrarily large
amounts of information
(A) G is left linear grammar
(B) G is right linear grammar
(C) FSM eventually produces a sequence
of periodic sequence of states
(C) G is context free
(D) G is type 2
(D) FSM has fixed number states
30. Consider the following C code :
27. Consider the grammar G = (N, T, P, S),
Void test (float &v1, float &v2, float v)
where
{
N = {S, A, B}
v1 – = v;
T = {a, b}
v2 + = v;
P
}
{ (S AB), (B AB), ( A aa ),
Further x, y and z are set to 4.0, 6.0 and
1.0 respectively, and the above procedure
is invoked by the call test (x, y, z). Which
of the following statement best describes
the above scenario ?
( A a), (B b)}
Which of the following statement is true
about G ?
(A) G is context – sensitive
(A) The invocation results in dangling
pointer problem
(B) G is context – free
(B) The invocation results in aliasing
problem
(C) It is type- 0 grammar
(C) The invocation results in side effect
(D) G is type 3
IIIá
context-free
(D) The invocation results in run-time error
7
A-04-03
*A0403*
31. The perspective transformation between
object and image can be
35. Consider the following ‘C’ function:
Static int count;
(A) a linear 3x3 transformation
Void test (int x, int*P)
(B) a linear 4x4 transformation
{ int y;
(C) a nonlinear 3x3 transformation
(D) a nonlinear 4x4 transformation
32. A touch screen is recommended for
(A) Pressure – sensitive drawing and
painting
/* line 1*/
++ P;
/* line 2*/
*P = 123;
/* line 3*/
Count = Count + 234
/* line 4*/
}
(B) Projects that track users
Which of the lines (lines 1 – 4) in the given
C function would make the function
non- reentrant ?
(C) Program involving public input and
simple tasks
(D) Day-to-day computer work
(A) Line 1
33. A “picking” Input Device is an example of
a
(B) Line 2
(A) Sampling Based Input Device
(C) Line 3
(B) Request Based Input Device
(D) Line 4
(C) Physical Input Device
36. Which of the following is a correct
statement about TCP ?
(D) Logical Input Device
34. Consider the following C Program
Segment :
(A) It is between two adjacent nodes
(B) It is between two hosts
test ( )
(C) It is between two modems
{ int i;
(D) It is between two routers
static int j = 0;
---
37. The purpose of the Ethernet frame
preamble is to provide:
--}
(A) a mechanism where by Ethernet’s
CSMA / CD can determine if a collision
has occurred
Which of the following statements is true
about the allocation of memory to i and j ?
(B) the destination MAC address at the
beginning of the frame
(A) Both i and j use dynamic allocation
(B) ‘i’ uses static allocation and ‘j’ uses
dynamic allocation
(C) information that identifies the type of
data in the frame
(C) Both i and j use static allocation
(D) a mechanism whereby each node can
synchronize itself to the passing frame
(D) i uses dynamic allocation and j uses
static allocation
IIIá
y = x*2;
8
A-04-03
*A0403*
38. Which of the following is not used as a cost
estimation technique during the project
planning stage ?
42. Which approach to speech recognition
avoids the problem caused by the variation
in speech patterns among different
(A) Delphi technique
speakers ?
(B) Expert judgment
(C) Program
Evaluation
Technique (PERT) charts
(A) Continuous speech recognition
Review
(B) Isolated word recognition
(C) Connected word recognition
(D) Function Points (FP)
(D) Speaker-dependent recognition
39. White-box testing is most often used as a
form of
43. PROLOG is an AI programming language
(A) Top-down testing
which solves problems with a form of
(B) Big-band testing
symbolic logic known as predicate
(C) Unit testing
calculus. It was developed in 1972 at
University of Marseilles by a team of
(D) Acceptance testing
specialists, name the person who headed
40. Which of the following is a measure of the
size of an information system based on the
number and complexity of a system’s
inputs, outputs and files the user has to
interact with ?
this team.
(A) Alain Colmeerauer
(B) Nicklaus Wirth
(C) Seymour Papert
(A) Lines Of Code (LOC)
(D) John McCarthy
(B) Function Point (FP)
44. You want to connect 2 networks that are
(C) Critical Path Method (CPM)
(D) Program
Evaluation
Technique (PERT)
both IO base T Ethernet networks. The
Review
2 networks are located in separate
buildings so that they are approximately
41. In LISP, the function evaluates <object>
and assigns this value to the unevaluated
<sconst>.
IIIá
1,000 meters apart. Which media should
you use ?
(A) (constant <sconst><object>)
(A) Type 1 STP cable
(B) (def constant <sconst><object>)
(B) RG-58 A/U co-axial cable
(C) (eva<sconst><object>)
(C) Fiber-optic cable
(D) (eva<object><sconst>)
(D) Wireless infrared
9
A-04-03
*A0403*
45. What does the transport protocol do ?
47. You need to install network adapters in
20 ISA-bus computers, which rule must
(A) It defines how data should be
presented to the next receiving layer,
Packages the data accordingly, and
then passes the data to the application
through the session layer interface.
you follow when installing the network
adapters ?
(A) All adapters in a computer, including
the network adapter, must be set to the
(B) It provides low-level access to the
network adapters by providing data
transmission support and some basic
adapter management functions.
same IRQ.
(B) All adapters in a computer, including
the network adapter, must be set to the
different IRQs.
(C) It supports communications between
applications on different computers by
creating sessions, defining dataexchange formats, and providing
application – support services.
(C) All network adapters in all computers
on the same network must be set to
same IRQ.
(D) All network adapters in all computers
on the same network must be set to
(D) It is responsible for establishing
logical names on the network,
establishing connections between
two logical names on the network, and
supporting reliable data transfer
between computers that have
established a session.
different IRQs.
48. From your client computer, you are able
to access several servers on your
10Base2 Ethernet network. However, you
are NOT able to access a server names
RED. Other client computers are able to
46. What must you do to create a printer pool
containing four shared printers on your
windows NT server computer ?
access RED. What is the most likely cause
of the problem ?
(A) There is an incorrect IRQ setting on
(A) Set up all the printers to share the
same parallel port
the network adapter in your client
computer
(B) Set individual printer properties for
each printer
IIIá
(B) There is a break in the cable
(C) Set up all printers as network-interface
printer devices
(C) There is a protocol mismatch between
(D) Specify the same printer driver and
settings for all printers
(D) An excessive number of collisions are
your client computer and RED
occurring on the media
10
A-04-03
*A0403*
49. Why does a high number of broadcast
messages adversely affect overall network
performance ?
(A) Each broadcast message requires an
acknowledgement packet from every
computer on the network
(B) No computer on the network can
transmit data until each broadcast
message has been acknowledged by
every computer on the network
(C) Broadcast
messages
are
automatically routed to every segment
of a LAN
(D) Every computer on the network must
process each broadcast message
52. Which of the following is the correct
sequence of the statements to be executed
to insert a node in a single linked list after
a node whose address is p ? The pointer
field next ptr points to the next node and
the address of the new node is q.
(A) p nextptr = q; q nextptr = p;
(B) p nextptr = q; q nextptr = p
next ptr;
(C) q nextptr = p nextptr; p next
ptr = q;
(D) q nextptr = p nextptr; p next
ptr = q next ptr;
50. Let the weight of minimum spanning tree
of a given graph G as per Kruskal’s
algorithm is W k and as per Prim’s
algorithm is Wp, then
(A) Wk< Wp
53. Consider the following recurrence relation
T(n) = 2T (n/2) + log n,
(B) Wk> = Wp
(C) Wk = Wp
T(n) = b for n< 2, for some constant b > 0
(D) None of these
If T(n) were to denote the running time of
an algorithm, what would it be equal to in
Big O notation ?
51. Consider the following binary search tree
with AVL property
(A) O (n)
(B) O (n log n)
2
(C) O (n )
2
(D) O (n log n)
What will be the tree in array
representation after element ‘a’ is inserted
and the tree has to maintain both the binary
search tree and AVL properties ?
(A) A problem Q is NP – Complete and if
it is NP and NP-hard.
(A)
5
3
2
4
7
6
1
8
(B)
5
3
7
2
4
6
8
1
(C)
4
2
6
1
3
5
7
8
(C) P < NP
8
(D) If a problem Q is NP-hard, it implies Q
is in NP
(D)
IIIá
54. Which of the following statements about
NP-complete is false ?
5
3
7
2
4
6
1
(B) If any NP-complete problem is in P,
then P=NP
11
A-04-03
*A0403*
55. Which of the following is not the function
59. Which of the following page replacement
algorithms suffers from Belody’s anomaly ?
of process control subsystem of UNIX ?
(A) FIFO
(A) Does inter-Process Communication
(B) LRU
(B) Does Process Scheduling
(C) LFU
(C) Does Memory Management
(D) None
(D) Does Device Management
60. Which of the following components of a
program state are shared across threads
in a multithreaded process ?
56. If the block size of Unix file system is 4K
bytes, what would be the maximum size
of a file possible with only direct and single
indirect blocks ? Each entry in the single
indirect block is of 4 bytes. An inode
accommodates 9 direct block entries.
(A) Register values
(B) Program counter
(C) Stack memory
(D) Heap memory
(A) 36 K
61. Which of the following scheduling
algorithms could result in starvation ?
(B) 4 MB
(C) 4MB + 36 K
1. FCFS
(D) 44 MB + 36 K
2. Shortest job first
3. Round Robin
57. What is the mechanism used to describe
deadlocks ?
4. Priority
(A) Precedence Graph
(A) 1 and 2 only
(B) Process State Diagram
(B) 1 and 3 only
(C) 2 and 4 only
(C) Resource Allocation Graph
(D) 2 only
(D) Process Control Block
62. Banker’s algorithm of Deadlock Avoidance
avoids deadlock by ensuring the following
necessary condition for a deadlock to
occur never holds
58. Overlays are used for the following
purpose
(A) To save memory
(A) No pre-emption
(B) To increase processing speed
(B) Hold and wait
(C) To reduce fragmentation
(C) Circular wait
(D) To reduce functional time
IIIá
(D) Mutual exclusion
12
A-04-03
*A0403*
67. Which of the following statements is
incorrect ?
63. Which of the following disk space
allocation method is used by UNIX
operating system?
(A) LR Parsers can be constructed to
recognize virtually all programming
language constructs for which context
free grammar can be written
(A) Contiguous allocation
(B) Linked allocation
(C) Indexed allocation
(B) The LR parsing method is the most
general non backtracking shift-reduce
parsing method known
(D) FAT scheme
64. How many page frames are required to
execute the following instruction ?
(C) The class of grammars that can be
parsed using LR methods is a subset
of the class of grammars that can be
parsed with predictive parsers
MOV OP1, OP2
Where the instruction is of two words and
OP1 and OP2 are indirect addresses.
(D) An LR parser can detect syntactic error
as soon as it is possible to do so on a
left-to-right scan of the input
(A) 2
(B) 4
68. The library files that come with ‘C’ are
(C) 6
(A) Text editors
development
(D) 8
65. Which of the following statements is
incorrect about HTTP ?
programme
(B) The compiler and linker
(C) Programme examples
(A) HTTP is stateless
(D) File that contain functions which carry
out various operations and
calculations
(B) HTTP is an application layer protocol
(C) HTTP uses UDP as its transport layer
(D) HTTP protocol operates between
browser and web server
69. Another technique for tree indexing where
the branching criterion at a particular level
in a tree will be based on the position of
the key value rather than
66. Which of the following equation gives
average access time to a memory system
with main memory access time as T1, cache
access time as T2 and a hit ratio as H ?
(A) Its entire key value and this concept
called tree
(B) Its entire key value and this concept
called B tree
(A) Ta = T1 + (1– H)T2
(B) Ta = H. T1 + (1– H) (T1+T2)
IIIá
for
(C) Ta = T2 + (1– H)T1
(C) Its entire key value and this concept
called C tree
(D) Ta = (1– H)T2+ HT1
(D) None of the above
13
A-04-03
*A0403*
70. ________ is used for external searching.
73. Change control for business application
systems
(A) Binary Tree
being
developed
using
prototyping could be complicated by
(B) B-Tree
(A) Iterative nature of prototyping
(C) AVL Tree
(B) Rapid pace of modifications in
(D) Any Tree
requirements and design
(C) Emphasis on reports and screens
71. A Decision Support System (DSS)
(D) None of the above
(A) is aimed at solving highly structured
74. Consider the activity of extracting and
problems
reusing design and program components.
(B) combines the use of models with
This is an example of
non-traditional data access and
(A) Reverse engineering
retrieval functions
(B) Prototyping
(C) emphasises flexibility in the decision-
(C) Software reuse
making approach of users
(D) Re-engineering
(D) supports only structured decision75. The most common reason for the failure
making tasks
of information systems to meet the needs
72. The knowledge base of an expert system
of users is that
that uses questionnaires to lead the user
(A) User needs are constantly changing
through a series of choices before a
(B) The growth of user requirements was
conclusion is reached is known as
forecast inaccurately
(A) Rules
(C) The hardware system limits the
number of concurrent users
(B) Decision trees
(D) User participation in defining the
(C) Nets
system/s
(D) Data flow diagrams
requirements
was
inadequate
___________________
IIIá
14
A-04-03
*A0403*
Space for Rough Work
IIIá
15
A-04-03
*A0403*
Space for Rough Work
IIIá
16
A-04-03
© Copyright 2026 Paperzz